RECOMMENDATION ID1: Recommendation for HL7 RIM and/or Vocabulary Changes For Harmonization During: 11/2011 1 Sponsor’s Draft3: Sponsored by2: CBCC and Security Sponsor’s Status4 Pending Date Approved by Sponsor: October 4, 2011 Editor/ Author: Kathleen Connor PROPOSALNAME: Refactor Confidentiality concept domain, code system, and value sets Class Model Change Datatypes Change Structural Vocabulary Change Other Vocabulary Change SUMMARY RECOMMENDATION Confidentiality code system and value sets need to be restructured because they do not meet the definition of Confidentiality concept domain: “Values that control disclosure of information”. Several value sets are related to access control, which is better handled via participations and roles. Other value sets classify the information sensitivity, which are policy-based determination of information value and importance, including vulnerability to adverse effect for unauthorized disclosure. The sensitivity-related value sets should be relocated as ActCodes specializing ActPolicyType. VOCABULARY OBJECTS CHANGE SUMMARY Abbrev. D S C V B Description Concept Domains Code Systems Concept Codes in a Code System Value Sets Context Bindings # to add # to remove 2 13 4 # to change 1 1 4 3 POSITION OF CONCERNED ORGANIZATIONS: ORG RECOMMENDATION APPROVAL STATUS AFFECTED ELEMENTS OF INTEREST TO ORG CBCC October 4, 2011 Entire proposal ISSUES: Issue A: Need to separate the interoperable Confidentiality Codes from the non-interoperable ConfidentialityByInfoType codes, which are bound to a policy domain The usage notes in the HL7 v.3 Normative Editions previous to 2011 suggest that the Act.confidentialityCode and Role.confidentialityCode attributes are synonymous with ‘sensitivity.’ At harmonization in 2009, it was agreed that these two concepts are not equivalent per ISO 7498-2:1989 definitions: 1 2 3 4 Identifier by which proposal is known to sponsor Must be sponsored by an HL7 TC, the HL7 International Committee, an HL7 SIG, or an ANSI or ISO accredited SDO For sponsor tracking only; not for Harmonization identification For sponsor tracking only; sponsor’s status must be “Approved” for submission to Harmonization Page |2 Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes Sensitivity is the characteristic of a resource which implies its value or importance and may include its vulnerability. Note: Vulnerability here is defined as medically vulnerable; subject to social stigmatization 2009Nov_HARM_PR 2009Nov_HARM_CO OPOSAL_RIM_MNM_w_beeler_ChangeDefinitionOfActConfidentialityCode_20091018223009.doc VERPAGE_RIM_MNM_w_beeler_AddAttributeActSensitivityCode_20091018223107.doc Subsequently, the definition of confidentialityCode in the 2011 Normative Edition was changed to read that Confidentiality attribute on Act (and similarly on Role) can be used to convey both information sensitivity and the information handling instructions, which are very different concepts. 6.5.15 Act.confidentialityCode :: SET<CE> (0..*) Conformance constraint: U Property isDocumentCharacteristic: true Concept domain: Confidentiality Definition: Codes that identify how sensitive a piece of information is and/or that indicate how the information may be made available or disclosed. Open Issue: The definition of this concept needs work in particular to help distinguish and identify the relationship between the types of concepts that it conveys and how best to encode and communicate them with this one attribute. The Open Issue indicates that work is required to distinguish and disambiguate the relationship between these two concepts, and to find a solution to how these should be used given that there is only one attribute. The HL7 Confidentiality Code Refactoring Project was initiated to develop a solution. One approach considered is to add an additional attribute for sensitivity to ActClass and RoleClass. Upon further analysis, it was determined that the concept of information sensitivity is akin to a privacy policy that is based on the evaluation of information importance and vulnerability to adverse effect of unauthorized disclosure. Application of the policy results in a classification of information sensitivity. Such a policy governs how information is to be handled, which is conveyed using a Confidentiality Code. Further, a privacy policy reflects context and interdependency of information, which is difficult to communicate with a single sensitivity code on a single class. For example, while a medication in and of itself may not be a sensitive piece of information, in combination with the patient age (e.g., an adolescent), a patient’s role (victim of abuse), and a diagnosis related to reproductive health, may become, by privacy policy, extremely sensitive. If sensitivity were an attribute on Acts and Roles, then a document or message communicating this information would have multiple sensitivity attributes scattered across the classes representing the patient entity, role, medication and diagnosis. These would have to be collectively evaluated to determine that this information is, for example, governed by an adolescent sensitive health and abuse-related privacy policy restricting disclosure for adolescent reproductive health and safeguarding the patient from the abuser. In addition, this approach would require authorized receivers to evaluate these sensitivity values in precisely the same manner in order to determine the information handling obligations intended by the sender. This would require complex point-to-point negotiations that would impede interoperability. If, in the alternative, the sensitivity values were placed at the header of a document or in the control act wrapper of a message, then multiple sensitivity attributes would need to be combined to convey the sensitivity of the payload (for example, adolescent victim of abuse receiving reproductive health medication) or be so vague as to be uninformative, for example, ‘sensitive adolescent health’. Last, if sensitivity values are placed on a message or document wrapper to summarize the sensitivity level, then the protected information would be revealed to unauthorized intermediaries and receivers. Given that the purpose for tagging Acts and Roles with Confidentiality Codes is to convey information handling protocols while protecting sensitive information from disclosure, the HL7 Confidentiality Code Refactoring Project concluded that it Page |3 would be best to restrict the coded values that can be assigned to the Confidentiality attribute to a comprehensive but limited set of interoperable Confidentiality Codes, which simply convey receivers’ information-handling obligations. These codes would indicate how the receiver can acquire more detailed information about the information sensitivity and applicable privacy policies to which the receiver must comply. In order to communicate information sensitivity and applicable privacy policies that govern the assignment of a Confidentiality Code on an Act or Role, an ActRelationship “COMPLY” may be associated with an ActClassPolicy, and a coded concept from the ActPrivacyPolicyType value set could be used to identify the applicable privacy law or sensitivity classification. A new ActPrivacyPolicyType code system will need to be adopted to fulfill this requirement. Ten of the codes from current Confidentiality value sets related to sensitivity should be moved into that code system. Issue B: Conflation of Confidentiality with Sensitive Information Categories Findings from the HL7 Refactor Confidentiality Code project indicate that the current HL7 Confidentiality concept domain, code system, and value sets are overloading the coded attributes of confidentiality. The current Confidentiality code system conflates multiple purposes of access control, information handling protocols, patient roles, and sensitivity classifications based on policies related to stigmatizing conditions. Code Definition • ConfidentialityByAccessKind ConfidentialityModifiers • • • ConfidentialityByInfoType A value set that allows access to information by subject / role and relationship based rights These concepts are mutually exclusive; one and only one is required for a valid confidentiality coding. Modifiers of role-based access rights Multiple allowed • • • Concepts By information type, only for service catalog entries Multiple allowed Not to be used with actual patient data! • • • Information handling protocols Role-based access control User-based access control Patient role Provider requested sensitivity Patient requested sensitivity • • • • Categories of stigmatized conditions or patient status As illustrated below, these “orthogonal” axes are an attempt to “model” relationships among different concept classes with post-coordination. This enables implementers to change the meaning of the confidentialityCode attribute via the vocabulary bindings. This results in ambiguous semantics and implementer confusion. Page |4 As currently structured, it is permissible to combine one value (e.g., Restricted) from ConfidentialityByAccessKind with multiple coded concepts from the ConfidentialityByInfoType and ConfidentialityModifiers, for example: Confidentiality ByAccessKind Restricted Clinician Individual Definition ConfidentialityModifiers Restricted access, e.g. only to providers having a current care relationship to the patient. Celebrity Taboo Patient Requested Only clinicians may see this item; billing and administration persons cannot access this item without special permission. Access only to individual persons who are mentioned explicitly as actors of this service and whose actor type warrants that access (cf. to actor type code). Celebrity Taboo Patient Requested Celebrity Taboo Patient Requested ConfidentialityByInfoTyp e HIV Substance Abuse Mental Health Domestic Violence HIV Substance Abuse Mental Health Domestic Violence HIV Substance Abuse Mental Health Domestic Violence However, although there are obvious use cases in which all three of the ConfidentialityByAccessKind codes (Restricted, Individual, and Clinician) could apply and even overlap, they are not permitted to be used together. In addition, the “mutual exclusivity constraint”, which limits use to only one ConfidentialityByAccessKind code, is not computably enforceable. That type of constraint can only be computably enforced by cardinality on the ConfidentialityCode attribute, and limiting the value set to which that attribute can be bound to a rigorously defined, representative realm code system as proposed in the Recommendation Section below. Issue C: Compatibility with intended meaning of the RIM ConfidentialityCode attribute The definition of the Confidentiality Concept Domain is about information handling protocols to prevent unauthorized disclosure. The examples listed in the Concept Domain Definition/Description (below) include “substance abuse”, which is a type of policy governing information sensitivity. The definition is incompatible with the definition of the RIM attribute confidentialityCode, which was recently changed to reflect issues raised in the 2009 Harmonization Proposals as discussed above in Issue A. MnM should consider reverting the RIM definition to that used prior to the 2011 Normative Edition. Confidentiality Page |5 Lvl 0 Concept Domain Name Value Set Binding RIM Attribute(s) Confidentiality Act.confidentialityCode (DSET<CD>) Confidentiality (R1 as CWE) Role.confidentialityCode (DSET<CD>) Definition/Description Definition: Values that control disclosure of information. Example: Normal, restricted, substance abuse related. 2010 Normative Edition 5.5.15 Act.confidentialityCode :: SET<CE> (0..*) Conformance constraint: U Property isDocumentCharacteristic: true Concept domain: Confidentiality Definition: Constraints around appropriate disclosure of information about this Act, regardless of mood. 2011 Normative Edition .5.15 Act.confidentialityCode :: SET<CE> (0..*) Conformance constraint: U Property isDocumentCharacteristic: true Concept domain: Confidentiality Definition: Codes that identify how sensitive a piece of information is and/or that indicate how the information may be made available or disclosed. ISSUE SUMMARY In summary, these issues indicate that the current Confidentiality vocabulary and the definition of the confidentialityCode are sufficiently discombobulated as to require major overhaul. CURRENT STATE: Value sets using code system: Confidentiality [2.16.840.1.113883.5.25] Confidentiality ConfidentialityByInfoType x_BasicConfidentialityKind ConfidentialityByAccessKind ConfidentialityModifiers x_VeryBasicConfidentialityKind Code Definition • ConfidentialityByAccessKind ConfidentialityModifiers ConfidentialityByInfoType • A value set that allows access to information by subject / role and relationship based rights These concepts are mutually exclusive, one and only one is required for a valid confidentiality coding) Modifiers of role based access rights Multiple allowed • • • • • By information type, only for service catalog entries Multiple allowed Not to be used with actual patient data! Page |6 ConfidentialityByAccessKind mixes role-based and user-based access control values (clinician and individual) with codes that convey information handling protocols and obligations such as Normal and Restricted. The access control coded concepts would be better modeled as roles and participations with permitted actions. ConfidentialityModifiers are codes for policies related to, for example, a patient characteristic that may be the reason why the information has access control or information handling requirements within policy domains governed by the same jurisdictional and organizational policies. The actual policy would need to be consulted in order to understand the semantics. This value set contains only a few of the multitude of similar policy based sensitivity indicators. Others typically included are employee (which only makes sense within an enterprise); emancipated minor; and provider of sensitive services. ConfidentialityByInfoType is an incomplete, non-interoperable sensitive information scheme that might be used within policy domains governed by the same jurisdictional and organizational policies. Clearly, these are only examples of the many coded concepts that could be used as stigmatizing conditions and procedures change regularly. One would expect to see coded concepts for genetic disease and sickle cell disease. The problem is getting consensus across multiple policy domains about the information objects to which these coded concepts apply. ConfidentialityModifiers and ConfidentialityByInfoType could be used as metadata for sensitivity classification and data segmentation purposes internal to a policy domain. This would facilitate the sender’s assignment of interoperable Confidentiality Codes at exchange time. These should be coded concepts in a code system with context binding to ActPrivacyPolicyType as a specialization of the ActPolicyType. OPTIONS CONSIDERED: Three options have been considered to resolve issues surrounding the Confidentiality code system. 1. Refine the current multi-axial vocabulary by restructuring the Confidentiality code vocabulary and postcoordination rules to meet vocabulary best practices. 2. Create two class attributes on Acts and Roles – one for confidentiality and one for sensitivity, but that results in the issue discussed above – that sensitivity classifications are inherently non-interoperable because they reflect a policy domain’s classification of information value and vulnerability to adverse effects resulting in unauthorized disclosure. This was proposed at the 2009 Harmonization meeting but tabled because of missing information. 2009Nov_HARM_PR OPOSAL_RIM_SECURE_ioana_singureanu_HL7 RIM Change Sensitivity Code_20091030003236.doc 3. Create separate vocabulary for Confidentiality and Sensitivity, binding the confidentialityCode attribute to the Confidentiality value set and relocating the Sensitivity concepts under ActPolicyType, which is a specialization of the ActCode concept domain. Page |7 RATIONALE: A key impetus for this project is that Government regulations internationally allow patients to specify finer constraints on the sharing of their medical records RECOMMENDATION DETAILS: The RIM attribute confidentialityCode should be made a Normative Code System with Data Type CS as the proposed HL7 code system is intended to cover all known values that control disclosure of information. The value sets: v: Confidentiality; x_BasicConfidentialityKind; and v: x_VeryBasicConfidentialityKind should be flagged immutable.5 Summary of Changes: Changes to ConfidentialityByInfoType and Confidentiality Modifiers: Relocated as example policies governing the assignment of confidentiality codes to the ActPrivacyPolicyType ActCode vocabulary WRT to Checklist Question 47: If deprecating a value set, have you identified a reason for the deprecation and provided guidance for what should be used instead? We recommend that where a model is intended to represent that the assignment of a ConfidentialityCode on an Act or a Role complies with a policy, that the target class be associated with 1…* ActClassPolicy classes, which can be valued with applicable ActPolicyType e.g., v: InformationSensitivityPolicy (where the codes deprecated from ConfidentialityByInfoType and Confidentiality Modifiers have been relocated.) Changes to ConfidentialityByAccessType: Add two Confidentiality Codes for unrestricted and moderate confidentiality Refined definitions for low, normal, restricted, and very restricted Defined all Confidentiality Codes to reflect the full range of possible sensitivity classifications typical of security policies Added usage notes that indicate that further obligations that may govern authorized receivers Deprecate codes Clinician and Individual as these are better modeled as access control by role or entity Relocate Business to ActPrivacyPolicyType as an example policy governing the Confidentiality value assigned to a role, e.g., SPL ingredient role as restricted because of trade secret policy. WRT to Checklist Question 47: If deprecating a value set, have you identified a reason for the deprecation and provided guidance for what should be used instead? We recommend that models intended to convey role or user access control constraints use restrictive participations to target acts for relevant role types. “Business” has been moved to the ActPolicyType code system, and the remediation discussed above applies. Changes illustrated below: 5 I.e., marked as IsImmutable in DEFN=UV=VO=1099-20110726.coremif: <valueSet id="2.16.840.1.113883.1.11.10228" name="Confidentiality" isImmutable="true"> Page |8 class ConfidentialityCodes «Abstract Code» Confidentiality «DomainCodedValue» + Low = L + Moderate = M + Normal = N + Restricted = R + Unrestricted = U + Very Restricted = VR «Abstract Code» x_BasicConfidentialityKind «DomainCodedValue» + Normal = N + Restricted = R + Very Restricted = VR «Abstract Code» x_VeryBasicConfidentialityKind «DomainCodedValue» + Normal = N + Restricted = R Below is an attached spreadsheet with the entire vocabulary including new concept sub-domains, code system, and value set. Confidentiality Code Vocabulary.xlsx Table below included for discussion purposes only. In case of any discrepancies, please consider the attached spreadsheet (above) with complete vocabulary to be the “source of truth”. Page |9 Refactored Confidentiality Codes Lv lT y p Concept Code Head Codedefined Value Set RIM Attribute Definition, Properties, Relationships or Print Name 0- _Confidentiality A Definition: Privacy metadata indicating the sender’s sensitivity classification, which is based on an analysis of applicable privacy policies and the risk of harm that could result to the information subject from unauthorized disclosure. Description: The confidentiality code assigned by a sender based on the information’s sensitivity classification, which may convey a receiver’s obligation to ensure that the information is not made available or redisclosure to unauthorized individuals, entities, or processes (security principals) per applicable policies. Map: Definition aligns with ISO 7498-2:1989 - Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes. Concept Relationships: Specializes: Confidentiality Generalizes (derived): .U, .L, .M, .N, .R, .V Current Definitions Current Definition: By accessing subject / role and relationship based rights (These concepts are mutually exclusive, one and only one is required for a valid confidentiality coding.) Concept Relationships: Generalizes (derived): B D I L N R V 1- .U L unrestricted Definition: Privacy metadata indicating that the information is not classified as sensitive. N/A Examples: Includes information subject publicly available information, e.g., business name, phone, email or physical address. Usage Note: This metadata indicates that the receiver has no obligation to consider additional policies when making access control decisions. Note that in some jurisdictions, personally identifiable information must be protected as confidential, so it would not be appropriate to assign a confidentiality code of "unrestricted" to that information even if it is publicly available. Concept Relationships: Specializes: _Confidentiality 1- .L L low Definition: Privacy metadata indicating that the information has been de-identified, and there are mitigating circumstances that prevent re-identification, which minimize risk of harm to the information subject from unauthorized disclosure. The information requires protection to maintain low sensitivity. Examples: Includes anonymized, pseudonymized, or non-personally identifiable information such as HIPAA limited data sets. Usage Note: This metadata indicates the receiver may have an obligation to comply with a data use agreement. No clear map to ISO 13606-4 Sensitivity Level (1) Care Management: RECORD_COMPONENTs that might need to be accessed by a wide range of administrative staff to manage the subject of care’s access to health services. Concept Relationships: Specializes: _Confidentiality 1- . M L moderate Definition: Privacy metadata indicating moderately sensitive information, which presents moderate risk of harm to the N/A information subject if disclosed without authorization. Examples: includes allergies of non-sensitive nature used inform food service; health information a patient authorizes to be used for marketing, released to a bank for a health credit card or savings account; or information in personal health record systems that are not governed under health privacy laws. Usage Note: This metadata indicates that the receiver may be obligated to comply with the receiver’s terms of use or privacy policies. Partial Map to ISO 13606-4 Sensitivity Level (2) Clinical Management: Less sensitive RECORD_COMPONENTs that might need to be accessed by a wider range of personnel not all of whom are actively caring for the patient (e.g. radiology staff). Concept Relationships: Specializes: _Confidentiality 1- . N L normal Definition: Privacy metadata indicating that the information is typical, non-stigmatizing health information, which presents typical risk of harm to the information subject if disclosed without authorization. Examples: In the US, this includes what HIPAA identifies as the minimum necessary protected health information (PHI) given a covered purpose of use (treatment, payment, or operations). Includes typical, non-stigmatizing health information disclosed in an application for health, workers compensation, disability, or life insurance. Usage Note: This metadata indicates that the receiver may be obligated to comply with applicable jurisdictional privacy law or disclosure authorization. Partial Map to ISO 13606-4 Sensitivity Level (3) Clinical Care: Default for normal clinical care access (i.e. most clinical staff directly caring for the patient should be able to access nearly all of the EHR). Maps to normal confidentiality for treatment information but not to ancillary care, payment and operations. Concept Relationships: Specializes: _Confidentiality Current Definition: Normal confidentiality rules (according to good health care practice) apply, that is, only authorized individuals with a legitimate medical or business need may access this item. Concept Relationships: Specializes: _Confidentiality 1- . R L restricted Definition: Privacy metadata indicating highly sensitive, potentially stigmatizing information, which presents a high risk to the information subject if disclosed without authorization. May be preempted by jurisdictional law, e.g., for public health reporting or emergency treatment. Examples: Includes information related to mental health, HIV, substance abuse, domestic violence, child abuse, genetic disease, and reproductive health. Usage Note: This metadata indicates that the receiver may be obligated to comply with the information subject’s consent directive or with organizational policies that are more stringent than jurisdictional privacy laws. Partial Map to ISO 13606-4 Sensitivity Level (4) Privileged Care: Access restricted to a small group of people caring intimately for the patient, perhaps an immediate care team or senior clinical party (the privileged clinical setting needs to be specified e.g. mental health). Concept Relationships: Specializes: _Confidentiality Current Definition: Restricted access, e.g. only to providers having a current care relationship to the patient. Concept Relationships: Specializes: _Confidentiality 1- . V L very restricted Definition: Privacy metadata indicating extremely sensitive, likely stigmatizing information, which presents a very high risk to the information subject if disclosed without authorization. This information must be kept in the highest confidence. Examples: Includes information about a victim of abuse, patient requested information sensitivity, and taboo subjects relating to health status that must be discussed with the patient by an attending provider before sharing with the patient. May also include information held under “legal lock”. Usage Note: This metadata indicates that the receiver may not disclose this information except as directed by the information custodian, who may be the information subject. Partial Map to ISO 13606-4 Sensitivity Level (5) Personal Care: To be shared by the subject of care perhaps with only one or two other people whom they trust most, or only accessible to the subject of care (and to others by one-off authorizations). Concept Relationships: Specializes: _Confidentiality Current Definition: No patient record item can be of low confidentiality. However, some service objects are not patient related and therefore may have low confidentiality. Concept Relationships: Specializes: _Confidentiality Current Definition: Very restricted access as declared by the Privacy Officer of the record holder. Concept Relationships: Specializes: _Confidentiality DISCUSSION: The following activity diagram illustrates how to implement a sender system capable of assigning confidentiality codes and a receiver system capable of complying with confidentiality codes. act Use of Priv acy Metadata for Data Segmentation Sending System Receiv ing System System initiates disclosure Select data to be disclosed Very restricted data is excluded from exchange [some data is deemed very restricted] Is any data protected? [some data is confidentialtiy=normal] [some data is protected] Is consent required [consent not required AND confidentiality=normal] Assign priv acy metadata to health data Receiv e health data [required AND consent not available] Request and record priv acy consent Process priv acy metadata [consent granted AND confidentiality=restricted] Is health data de-identified? Is priv acy consent granted? [confidentiality=restricted] [consent granted with conditions] Add conditions and consent to transmission [confidentiality= restricted] [de-identified AND confidentiality=low] [confidentiality=low OR confidentiality= normal] Rev ise priv acy metadata Ev aluate obligations and priv acy consent Send health data, its metadata and other related information Record disclosure Consent withheld Accept Data [able to comply] Able to comply? [unable to comply] Automatic disclosure failed Rej ect data P a g e | 11 P a g e | 12 class ConfidentialityCodes & ActPolicyVocabulary «Abstract Code» ActPolicy Vocabulary:: ActPolicyType «Abstract Code» ConfidentialityCodes:: Confidentiality «DomainCodedVal... + coverage policy «DomainCodedValue» + Low = L + Moderate = M + Normal = N + Restricted = R + Unrestricted = U + Very Restricted = VR CompliesWith «Abstract Co... ActPolicy Vocabulary:: ActPriv acyPolicy «Abstract Code» ActPolicy Vocabulary:: ActConsentDirectiv e + + + Emergency only Opt-in Opt-out «Abstract Code» ActPolicy Vocabulary:: InformationSensitiv ityPolicy «DomainCodedValue» + adolescent information sensitivity + celebrity information sensitivity + diagnosis information sensitivity + drug information sensitivity + employee information sensitivity + patient default sensitivty + patient requested sensitivity «Abstract Code» ConfidentialityCodes:: x_BasicConfidentialityKind «Abstract Code» ConfidentialityCodes:: x_VeryBasicConfidentialityKind «DomainCodedValue» + Normal = N + Restricted = R + Very Restricted = VR «DomainCodedValue» + Normal = N + Restricted = R «Abstract Co... ActPolicy Vocabulary:: ActPriv acyLaw «Abstract Code» ActPolicy Vocabulary:: ActUSPriv acyLaw «DomainCodedValue» + 42 CFR Part2 + Common Rule + HIPAA notice of privacy practices + HIPAA psychotherapy notes + HIPAA self-pay «Abstract Code» ActPolicy Vocabulary:: EntityInformationSensitiv ityPolicy «Abstract Code» ActPolicy Vocabulary:: RoleInformationSensitiv ityPolicy «DomainCodedValue» + all demographic information sensitivity + date of birth information sensitivity + marital status information sensitivity + race information sensitivity + religion information sensitivity «DomainCodedValue» + business information sensitivity + employer information sensitivity + location information sensitivity «Abstract Code» ActPolicy Vocabulary::ActInformationSensitiv ityPolicy «DomainCodedValue» + genetic disease information sensitivity + HIV/AIDS information sensitivity + psychiatry information sensitivity + sexual assault, abuse, or domestic violence information sensitivity + sexually transmitted disease information sensitivity + substance abuse information sensitivity + taboo ACTION ITEMS: P a g e | 13 1. Review and approve associated Harmonization proposal for ActPolicyTypeCode, in which the codes from the current Confidentiality code system value set ConfidentialityByInfoType and ConfidentialityModifiers are relocated. 2. M&M to implement recommendation RESOLUTION: << REQUIRED before recommendation can be closed. Indicates how recommendation was brought to closure. Can include notes on further study or networking required, and by whom.>> Checklist for HL7 Vocabulary Harmonization Submissions The following checklist must be completed for each submission and attached as part of the submission posting for every HL7 harmonization proposal that proposes a change to any HL7 terminology artifact. (Submit your proposal as a zip containing the base proposal and this form, or copy this form onto the end of your proposal.) If a revised proposal is submitted (e.g. detailed proposal after cover page), a new copy of the checklist must be attached confirming that the revised proposal has been re-reviewed. The failure to attach a completed checklist will result in the tabling or deferral of the proposal to a subsequent harmonization meeting with the assumption the proposal will be re-introduced with a completed form. The proposal has been constructed in such a way that the “correct” answer to each question is either “Yes” or “N/A”. In the event that the answer is “No”, please provide an explanation at the end noting the question number and the reason why the checklist item has not been met. Harmonization proposals that do not satisfy all checklist items may still be considered at harmonization at the discretion of the harmonization group and the vocabulary maintenance team if there is a satisfactory reason the checklist item could not be met. Lack of time to complete the form does not constitute a satisfactory reason. A section of the form may be marked as “N/A” and all checklist items within that section ignored if none of the terminology items submitted apply to that section. In most circumstances, this checklist should be completed by the sponsor committee’s vocabulary facilitator, but it may be completed by any submitter. Note: When checking for existing codes, code systems, value sets, etc., please make sure that your RoseTree configuration options are set to display Retired and Deprecated elements, as the “no duplicates” rule applies to those as well. Before completing this checklist, please consult the following “best practices” and guidelines documents. (They will be updated from time to time, so please review the documents for changes prior to each harmonization.) Concept domain & Value set naming: http://wiki.hl7.org/index.php?title=Concept_Domain_Naming_Conventions http://wiki.hl7.org/index.php?title=Value_Set_Naming_Conventions Definitions: http://wiki.hl7.org/index.php?title=Annotations_Best_Practices Terminology Good Practices: http://wiki.hl7.org/index.php?title=Good_Terminology_Practices General General 1. Has the proposal, in its final form, been reviewed by the sponsor committee’s vocabulary facilitator (mark N/A if there is no facilitator)? ( - Yes; - No; - N/A) 2. Have you completely filled out header section for the proposal and checked that the dates are correct and the submission number is unique across all of your submissions for this harmonization cycle? ( - Yes; - No; N/A) 3. Have you filled out the summary form identifying the number of created, updated and deprecated objects of each type? ( - Yes ; - No; - N/A) 4. Has your proposal been submitted to and reviewed by all relevant WGs and been formally endorsed (with a vote recorded in the WG minutes) to be brought forward to harmonization? (For harmonization submissions from international affiliates, approval by an appropriate affiliate level committee or project is sufficient, though submission to the relevant HL7 UV WG is strongly recommended.) ( - Yes; - No; - N/A) New Concept Domains ( - N/A) For all concept domains being created by this proposal: P a g e | 15 5. Have you done a key-word search for equivalent or similar concept domains and, if any exist, identified appropriate parent and child relationships to position your concept domain? - Yes; - No; - N/A) 6. Have you provided a name for your concept domain that follows the naming guidelines?( N/A) - Yes; - No; - 7. If your concept domain is not associated with a new RIM attribute or datatype property, have you identified a parent for your concept domain?( - Yes; - No; - N/A) 8. Have you checked whether any existing concept domains are proper specializations of your concept domain and, if so, identified those new specialization relationships as part of your proposal? ( - Yes; - No; N/A) 9. If your concept domain is in the ActCode, RoleCode or EntityCode hierarchy, have you identified the classCode that acts as the “root” for the concept domain? ( - Yes; - No; - N/A) 10. Have you verified that all concept domains referenced as parent or child concepts actually exist in the most recent vocabulary repository and are correctly spelled in your proposal using U.S. language settings? ( - Yes; - No; - N/A) 11. Have you provided a concise, non-tautological definition for your concept domain and confirmed that the definition follows the best practices for definitions? ( - Yes; - No; - N/A) 12. Have you checked the name of your concept domain and associated definition for appropriate spelling and grammar using U.S. language settings, and consistency with the current Concept Domain naming conventions? ( - Yes; - No; - N/A) 13. Have you either: Provided 3 distinct examples; identified a binding to an example value set with 3 distinct example codes; identified a representative binding; or identified a universal binding? ( - Yes; - No; N/A) Revised Concept Domains ( - - N/A) For all concept domains being revised by this proposal: 14. Have you identified the name of the existing concept domain, and verified that the concept domain does in fact exist in the most recent vocabulary repository with the name spelled as referenced? (( - Yes; - No; N/A) 15. Have you verified that any additional concept domains identified as parents or children and any code referenced as the anchor for the concept domain actually exist and are spelled properly? (( - Yes; - No; - N/A) 16. Have you confirmed that any change to the definition would not cause backwards compatibility issues with any models that reference the Concept Domain under the old definition? ( - Yes; - No; - N/A) 17. Have you confirmed that any changes to the Concept Domain definition continue to comply with best practices for definitions? ( - Yes; - No; - N/A) 18. Have you spell-checked and grammar checked your revised definition using U.S. language settings? ( - No; - N/A) New/Revised Code System ( - N/A) For all code systems created or whose metadata is updated by this proposal: - Yes;; P a g e | 16 19. For new HL7-maintained code systems, have you confirmed that no other terminology maintenance organization is a more appropriate organization to maintain the code system and codes within it? ( - Yes; No; - N/A) Reviewed codes in 13606-4. 20. For new external code systems, have you confirmed that the code system follows the good terminology practices and is therefore appropriate for use in HL7 instances? ( - Yes; - No; - N/A) 21. For external code systems where there is a desire for HL7 to publish codes from the external code system, have you verified that there are no copyright issues associated with the publication and provided a justification for why HL7 should take on this administrative effort as well as identified how the HL7 published versions will be kept in sync with the source? ( - Yes; - No; - N/A) 22. Have you provided a short-name for the code system that is unique among all other code systems found in the HL7 OID registry? ( - Yes; - No; - N/A) 23. For all code systems, have you provided: a. A long, unique “descriptive” name for the code system? ( - Yes; b. A description of the intended use and scope of the code system ( - No; - Yes; - N/A) - No; - N/A) 24. For external code systems, have you provided: a. OID for the code system (if already registered in the HL7 OID registry or otherwise assigned an OID)? ( - Yes; - No; - N/A) b. Licensing information ( - Yes; - No; - N/A) c. URL information for the official source of the vocabulary ( d. Contact Information ( - Yes; - No; - Yes; - No; - N/A) - N/A) e. The “short name” for the code system is consistent with the following rules (ISO Secondary Identifier rules plus some HL7 constraints) i. No spaces ii. Only the characters 0-9, a-z, A-Z and hyphens iii. Cannot have multiple consecutive hyphens or end with a hyphen iv. Leading character must be a lower-case alpha v. Must be unique from among all registered code systems in HL7’s OID registry vi. Should not match any code system in HL7’s OID registry even when treating both as upper-case Revised Code in Code System ( - N/A) For all new codes created by this proposal: 25. Have you searched the code system in the most recent repository using keywords to verify that an equivalent code doesn’t already exist? ( - Yes; - Yes; - No; - N/A) 26. Have you searched the code system in the most recent repository to confirm that no code already exists with the same code? ( - Yes; - No; - N/A) Note that you must also check existing retired and/or deprecated codes for existence. - P a g e | 17 27. If adding a code from an external code system for HL7 publication (where HL7 has agreed to publish codes from the external code system), have you confirmed that the code has actually been accepted by the external code system and confirmed the code, print names and definition are identical to those in the most recent version of the external code system? ( - Yes; - No; - N/A) Added or Revised Code in Code System ( - N/A) For all new codes created or updated by this proposal: 28. When adding a code or changing a print name, have you search searched the code system in the most recent repository that no code already exists with the same print name? ( - Yes; - No; - N/A) 29. Have you provided a code values and (where appropriate) print names that align with the naming convention for the code system? (Generally all upper case, no spaces for codes, lower case for print names. Depending on the code system, the code may be mnemonic or not). ( - Yes;; - No; - N/A) 30. Have you provided a definition for the code that follows the best practices for definitions? ( - N/A) - Yes; - No; 31. Have you spell-checked (and for definitions grammar-checked) the definitions and print names using U.S. language settings? ( - Yes;; - No; - N/A) 32. Have you defined all required properties for the code system in which the code is being added? ( No; - N/A) - Yes;; - a. ActClass: “specialized by concept domain”, Formal class name, formal name for association from participation to Act b. ActCode: “specialized by concept domain” c. ActMood: Formal name d. ActRelationshipType: “is document characteristic?”; applies to; how applies; Formal name from Act to outbound ActRelationship, ActRelationship to source Act, ActRelationship to target Act and Act to inbound ActRelationship; Sort for Act to inbound ActRelationship and Act to outbound ActRelationship e. CompressionAlgorithm: howApplies (mandatory, deprecated, other) f. EntityClass: “specialized by concept domain”, applies to determinerCode, Formal class name g. EntityDeterminer: Formal name h. GTSAbbreviation: Equivalent expression i. ObservationMethod: how applies? j. ParticipationType: “specialized by concept domain”, “is document characteristic?”, Formal name from Act to Participation and Role to Participation; Sort from Act to Participation and Role to Participation k. RoleClass: “specialized by concept domain”, Formal name, Participation to Role name, Role to player Entity name, Entity to played Role name, Entity to scoped Role name, Role to scoper Entity name, Entity to played Role sort, Entity to scoped Role sort l. RoleCode: conceptStatusQualifier m. RoleLinkType: Formal name from Role to outbound RoleLink, RoleLink to source Role, RoleLink to target Role and Role to inbound RoleLink; Sort for Role to inbound RoleLink and Role to outboundRoleLink P a g e | 18 33. Have you checked the current version of the code system and identified all code(s) that should be parents and/or children of the new concept and verified that you have listed them all appropriately (and spelled correctly) in your proposal? ( - Yes;; - No; - N/A) 34. Have you identified whether the code should be considered abstract or not?( - Yes; - No; - N/A) 35. If deprecating a code, have you identified a reason for the deprecation and provided guidance for what should be used instead? ( - Yes;; - No; - N/A) New Value Sets ( - N/A) For all new value sets created as part of this proposal: 36. Have you verified that the value set is appropriate to be registered in the HL7 Inc. repository (created against structural code systems, used in a UV, Example or Representative binding)? ( - Yes; - No; - N/A) 37. Have you identified whether the value set definition is immutable? I.e. It is a definition that must never be changed. ( - Yes; - No; - N/A) 38. Have you verified that the name for the value set does not already exist in the existing HL7 repository? ( - No; - N/A) 39. Have you named the value set using the naming guidelines found here: http://wiki.hl7.org/index.php?title=Value_Set_Naming_Conventions ( - Yes; New or Modified Value Sets ( - No; - Yes; - N/A) - N/A) For all value sets created or modified as part of this proposal: 40. That any modified value sets are not flagged as immutable. ( - Yes; - No; - N/A) The value sets: v: Confidentiality; x_BasicConfidentialityKind; and v: x_VeryBasicConfidentialityKind should be flagged immutable. 41. For non-immutable value sets, have you provided a description that explains the scope of the value set and the “owning” WG that should be responsible for determining how the value set definition evolves over time? ( Yes; - No; - N/A) 42. Have you defined all required properties for value sets drawn from one of the following structural code systems? ( - Yes; - No; - N/A) a. ActClass: Formal class name, formal name for association from participation to Act b. ActMood: Formal name c. ActRelationshipType: Formal name from Act to outbound ActRelationship, ActRelationship to source Act, ActRelationship to target Act and Act to inbound ActRelationship; Sort for Act to inbound ActRelationship and Act to outbound ActRelationship d. EntityClassFormal class name e. EntityDeterminer: Formal name f. ParticipationType: Formal name from Act to Participation and Role to Participation; Sort from Act to Participation and Role to Participation g. RoleClass: Formal name, Participation to Role name, Role to player Entity name, Entity to played Role name, Entity to scoped Role name, Role to scoper Entity name, Entity to played Role sort, Entity to scoped Role sort P a g e | 19 h. RoleLinkType: Formal name from Role to outbound RoleLink, RoleLink to source Role, RoleLink to target Role and Role to inbound RoleLink; Sort for Role to inbound RoleLink and Role to outboundRoleLink 43. Have you checked that your value set name and description are correctly spelled (and for descriptions, have correct grammar) using U.S. language settings, and is consistent with the current Value Set naming conventions? ( - Yes; - No; - N/A) 44. Have you checked that all references to codes in your value set definition identify their associated code system and actually exist within the current version of their respective code systems (both HL7 and external code systems)? ( - Yes; - No; - N/A) 45. Have you verified that if your value set content definition is enumerated (extensional) that there is no appropriate or better way to define it as an expression-based (intentional) definition? ( - Yes; - No; N/A) - 46. For expression-based value set content definitions, have you confirmed that your expression is expressed in a way that is fully defined against the HL7 metamodel? ( - Yes; - No; - N/A) a. For code-based value sets, identify whether the head-code is included or not b. For code-based value sets, identify whether the included codes should be children, all descendants or leaf nodes only c. For code based value sets, that the specific type of association to be navigated is identified if it is something other than the subsumption relationship d. For complex value sets, that they are expressed as a combination of unions, intersections and exclusions where “order of operations” is clearly documented e. For property-based value sets, that the referenced property names actually exist in their respective code systems and are spelled correctly f. That for mnemonic-based value sets, that the reg-ex expression to be evaluated against the codes is a valid reg-ex expression 47. If deprecating a value set, have you identified a reason for the deprecation and provided guidance for what should be used instead? ( - Yes; - No; - N/A) 48. New Binding Realms ( - N/A) For all new Binding Realms created as part of this proposal: 49. Have you identified the owning affiliate and the superset binding realm? ( - Yes; - No; 50. Have you received official permission from the affiliate to create the new binding realm ( N/A) - N/A) - Yes; - No; - 51. Have you identified a proposed code for the binding realm that is unique amongst all binding realms in the most recent version of the repository following binding realm naming conventions (i.e. starting with the code for the affiliate)? ( - Yes; - No; - N/A) 52. Have you provided a unique descriptive name for the new binding realm? ( - Yes; - No; - N/A) 53. Have you provided a description that explains the scope of the new binding realm and spell-checked and grammar-checked it? ( - Yes; - No; - N/A) P a g e | 20 New Context Bindings ( - N/A) For all new Context Bindings created as part of this proposal: 54. Have you declared the name of the concept domain, the binding realm and the value set name or OID? ( Yes; - No; - N/A) - 55. Have you checked that the concept domain name, binding realm code and value set name or OID actually exist in the most recent version of the repository? ( - Yes; - No; - N/A) 56. If the binding is not to be effective immediately upon harmonization approval and application of approved changes, have you identified the effective date? ( - Yes; - No; - N/A) 57. Have you checked whether there is already a binding for the same concept domain and binding realm and if so, either specified a new sequence number (to allow parallel bindings) or a date to on which the old binding should end and the new one should become effective? ( - Yes; - No; - N/A) 58. If binding in a realm other than “example”, have you conformed that the set of codes in the valueset being bound provides full coverage for the concept space defined by the concept domain? ( - Yes; - No; N/A) Explanation for N/A Items The N/A items did not apply to the proposal. <codeSystem name="Confidentiality" title="Confidentiality" codeSystemId="2.16.840.1.113883.5.25"> <header> <legalese> <notation>Is in UMLS.</notation> </legalese> <responsibleGroup organizationName="Health Level 7"/> <contributor> <role>Sponsor</role> <name name="Health Level Seven"/> </contributor> </header> <annotations> <documentation> <description> <text> <p>Values that control disclosure of information.</p> <p> <i>Example:</i> Normal, restricted, substance abuse related.</p> <p> <i>OpenIssue: </i>Description copied from Concept Domain of same name. Must be verified.</p> </text> </description> </documentation> </annotations> <releasedVersion releaseDate="2011-07-26" publisherVersionId="134" hl7MaintainedIndicator="true" completeCodesIndicator="true" hl7ApprovedIndicator="true"> <supportedLanguage>en</supportedLanguage> <supportedConceptRelationship relationshipKind="Specializes" name="Specializes" inverseName="Generalizes" isNavigable="true" reflexivity="irreflexive" symmetry="antisymmetric" transitivity="transitive"> <description>The child code is a more narrow version of the concept represented by the parent code. I.e. Every child concept is also a valid parent concept. Used to allow determination of subsumption. Must be transitive, irreflexive, antisymmetric.</description> P a g e | 21 </supportedConceptRelationship> <supportedConceptRelationship relationshipKind="Generalizes" name="Generalizes" inverseName="Specializes" isNavigable="true" reflexivity="irreflexive" symmetry="antisymmetric" transitivity="transitive"> <description>Inverse of Specializes. Only included as a derived relationship.</description> </supportedConceptRelationship> <supportedConceptProperty propertyName="internalId" type="Token" isMandatoryIndicator="false"> <description>The internal identifier for the concept in the HL7 Access database repository.</description> </supportedConceptProperty> <concept isSelectable="false"> <annotations> <documentation> <definition> <text> <p>By accessing subject / role and relationship based rights (These concepts are mutually exclusive, one and only one is required for a valid confidentiality coding.)</p> </text> </definition> </documentation> </annotations> <conceptProperty name="internalId" value="21049"/> <printName language="en" preferredForLanguage="true" text="ConfidentialityByAccessKind"/> <code code="_ConfidentialityByAccessKind" status="active"/> </concept> <concept isSelectable="false"> <annotations> <documentation> <definition> <text> <p>By information type, only for service catalog entries (multiples allowed). Not to be used with actual patient data!</p> </text> </definition> </documentation> </annotations> <conceptProperty name="internalId" value="21050"/> <printName language="en" preferredForLanguage="true" text="ConfidentialityByInfoType"/> <code code="_ConfidentialityByInfoType" status="active"/> </concept> <concept isSelectable="false"> <annotations> <documentation> <definition> <text> <p>Modifiers of role based access rights (multiple allowed)</p> </text> </definition> </documentation> </annotations> <conceptProperty name="internalId" value="21051"/> <printName language="en" preferredForLanguage="true" text="ConfidentialityModifiers"/> <code code="_ConfidentialityModifiers" status="active"/> </concept> P a g e | 22 <concept> <contextBinding conceptDomain="Confidentiality" valueSet="2.16.840.1.113883.1.11.10228" bindingRealmName="R1" codingStrength="CWE" effectiveDate="2011-07-26"/> <annotations> <documentation> <definition> <text> <p>Since the service class can represent knowledge structures that may be considered a trade or business secret, there is sometimes (though rarely) the need to flag those items as of business level confidentiality. However, no patient related information may ever be of this confidentiality level.</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByAccessKind"/> </conceptRelationship> <conceptProperty name="internalId" value="10235"/> <printName language="en" preferredForLanguage="true" text="business"/> <code code="B" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Only clinicians may see this item, billing and administration persons can not access this item without special permission.</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByAccessKind"/> </conceptRelationship> <conceptProperty name="internalId" value="10231"/> <printName language="en" preferredForLanguage="true" text="clinician"/> <code code="D" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Access only to individual persons who are mentioned explicitly as actors of this service and whose actor type warrants that access (cf. to actor type code).</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByAccessKind"/> </conceptRelationship> <conceptProperty name="internalId" value="10233"/> <printName language="en" preferredForLanguage="true" text="individual"/> <code code="I" status="active"/> </concept> <concept> P a g e | 23 <annotations> <documentation> <definition> <text> <p>No patient record item can be of low confidentiality. However, some service objects are not patient related and therefore may have low confidentiality.</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByAccessKind"/> </conceptRelationship> <conceptProperty name="internalId" value="10234"/> <printName language="en" preferredForLanguage="true" text="low"/> <code code="L" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Normal confidentiality rules (according to good health care practice) apply, that is, only authorized individuals with a legitimate medical or business need may access this item.</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByAccessKind"/> </conceptRelationship> <conceptProperty name="internalId" value="10230"/> <printName language="en" preferredForLanguage="true" text="normal"/> <code code="N" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Restricted access, e.g. only to providers having a current care relationship to the patient.</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByAccessKind"/> </conceptRelationship> <conceptProperty name="internalId" value="10232"/> <printName language="en" preferredForLanguage="true" text="restricted"/> <code code="R" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> P a g e | 24 <p>Very restricted access as declared by the Privacy Officer of the record holder.</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByAccessKind"/> </conceptRelationship> <conceptProperty name="internalId" value="14799"/> <printName language="en" preferredForLanguage="true" text="very restricted"/> <code code="V" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Alcohol/drug-abuse related item</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByInfoType"/> </conceptRelationship> <conceptProperty name="internalId" value="10243"/> <printName language="en" preferredForLanguage="true" text="substance abuse related"/> <code code="ETH" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>HIV and AIDS related item</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByInfoType"/> </conceptRelationship> <conceptProperty name="internalId" value="10241"/> <printName language="en" preferredForLanguage="true" text="HIV related"/> <code code="HIV" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Psychiatry related item</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> P a g e | 25 <targetConcept code="_ConfidentialityByInfoType"/> </conceptRelationship> <conceptProperty name="internalId" value="10242"/> <printName language="en" preferredForLanguage="true" text="psychiatry relate"/> <code code="PSY" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Sexual assault / domestic violence related item</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityByInfoType"/> </conceptRelationship> <conceptProperty name="internalId" value="10244"/> <printName language="en" preferredForLanguage="true" text="sexual and domestic violence related"/> <code code="SDV" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Celebrities are people of public interest (VIP) including employees, whose information require special protection.</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityModifiers"/> </conceptRelationship> <conceptProperty name="internalId" value="10239"/> <printName language="en" preferredForLanguage="true" text="celebrity"/> <code code="C" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Information for which the patient seeks heightened confidentiality. Sensitive information is not to be shared with family members. Information reported by the patient about family members is sensitive by default. Flag can be set or cleared on patient's request.</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityModifiers"/> </conceptRelationship> <conceptProperty name="internalId" value="10237"/> <printName language="en" preferredForLanguage="true" text="sensitive"/> P a g e | 26 <code code="S" status="active"/> </concept> <concept> <annotations> <documentation> <definition> <text> <p>Information not to be disclosed or discussed with patient except through physician assigned to patient in this case. This is usually a temporary constraint only, example use is a new fatal diagnosis or finding, such as malignancy or HIV.</p> </text> </definition> </documentation> </annotations> <conceptRelationship relationshipName="Specializes"> <targetConcept code="_ConfidentialityModifiers"/> </conceptRelationship> <conceptProperty name="internalId" value="10238"/> <printName language="en" preferredForLanguage="true" text="taboo"/> <code code="T" status="active"/> </concept>
© Copyright 2026 Paperzz